Skip to content

Commit c5398fc

Browse files
committed
post-review changes
1 parent 3be1619 commit c5398fc

File tree

4 files changed

+36
-36
lines changed

4 files changed

+36
-36
lines changed

doc/source/configuration/firewall.rst

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,19 +19,23 @@ follows:
1919
.. code-block:: yaml
2020
:caption: ``etc/kayobe/controllers.yml``
2121
22-
controller_firewalld_zones: "{{ stackhpc_firewalld_zones }}"
22+
controller_firewalld_enabled: true
2323
controller_firewalld_rules: "{{ stackhpc_firewalld_rules }}"
24+
controller_firewalld_zones: "{{ stackhpc_firewalld_zones }}"
25+
# Predefined zones are listed here:
26+
# https://firewalld.org/documentation/zone/predefined-zones.html
27+
# Unset to leave the default zone unchanged
28+
controller_firewalld_default_zone: drop
2429
2530
This will configure the standard set of firewalld rules on controller hosts.
26-
Rule definitions are automatically added according to group membership.Rule
31+
Rule definitions are automatically added according to group membership. Rule
2732
sets exist for the following groups:
2833

2934
* Controllers - ``stackhpc_controller_firewalld_rules``
3035
* Compute - ``stackhpc_compute_firewalld_rules``
3136
* Storage - ``stackhpc_storage_firewalld_rules``
3237
* Monitoring - ``stackhpc_monitoring_firewalld_rules``
33-
* Wazuh Manager Infrastructure VM - ``stackhpc_infra_vm_firewalld_rules``
34-
* Ansible Control host Infrastructure VM - ``stackhpc_infra_vm_firewalld_rules``
38+
* Wazuh Manager Infrastructure VM - ``stackhpc_wazuh_manager_infra_vm_firewalld_rules``
39+
* Ansible Control host Infrastructure VM - ``stackhpc_ansible_control_infra_vm_firewalld_rules``
3540
* Seed - ``stackhpc_seed_firewalld_rules``
3641
* Seed Hypervisor - ``stackhpc_seed_hypervisor_firewalld_rules``
37-

etc/kayobe/inventory/group_vars/all/firewall

Lines changed: 20 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
stackhpc_firewalld_zones: |
77
{% set network_zones = [] %}
88
{% for network in network_interfaces %}
9-
{% if network | net_zone is not none %}
9+
{% if network | net_zone %}
1010
{% set _ = network_zones.append({'zone': network | net_zone }) %}
1111
{% endif %}
1212
{% endfor %}
@@ -18,14 +18,14 @@ stackhpc_firewalld_rules: |
1818
(stackhpc_storage_firewalld_rules if 'storage' in group_names else []) +
1919
(stackhpc_monitoring_firewalld_rules if 'monitoring' in group_names else []) +
2020
(stackhpc_seed_firewalld_rules if 'seed' in group_names else []) +
21-
(stackhpc_seed_hypervisor_firewalld_rules if 'seed_hypervisor' in group_names else []) +
22-
(stackhpc_wazuh_manager_infra_vm_firewalld_rules if 'wazuh_manager' in group_names else []) +
23-
(stackhpc_ansible_control_infra_vm_firewalld_rules if 'ansible_control' in group_names else []) }}
21+
(stackhpc_seed_hypervisor_firewalld_rules if 'seed-hypervisor' in group_names else []) +
22+
(stackhpc_wazuh_manager_infra_vm_firewalld_rules if 'wazuh-manager' in group_names else []) +
23+
(stackhpc_ansible_control_infra_vm_firewalld_rules if 'ansible-control' in group_names else []) }}
2424

2525
###############################################################################
2626
# Controller firewalld rules
2727

28-
stackhpc_controller_firewalld_rules: |
28+
stackhpc_controller_firewalld_rules: >-
2929
{{ stackhpc_controller_firewalld_rules_default |
3030
selectattr('enabled', 'true') |
3131
map(attribute='rules') |
@@ -34,7 +34,7 @@ stackhpc_controller_firewalld_rules: |
3434
selectattr('zone') |
3535
union(stackhpc_controller_firewalld_rules_extra) |
3636
unique |
37-
select}}
37+
select }}
3838

3939
stackhpc_controller_firewalld_rules_default:
4040
# Common
@@ -123,7 +123,7 @@ stackhpc_controller_firewalld_rules_extra: []
123123
###############################################################################
124124
# Compute firewalld rules
125125

126-
stackhpc_compute_firewalld_rules: |
126+
stackhpc_compute_firewalld_rules: >-
127127
{{ stackhpc_compute_firewalld_rules_default |
128128
selectattr('enabled', 'true') |
129129
map(attribute='rules') |
@@ -132,7 +132,7 @@ stackhpc_compute_firewalld_rules: |
132132
selectattr('zone') |
133133
union(stackhpc_compute_firewalld_rules_extra) |
134134
unique |
135-
select}}
135+
select }}
136136

137137
stackhpc_compute_firewalld_rules_default:
138138
# Common
@@ -170,7 +170,7 @@ stackhpc_compute_firewalld_rules_extra: []
170170
###############################################################################
171171
# Storage firewalld rules
172172

173-
stackhpc_storage_firewalld_rules: |
173+
stackhpc_storage_firewalld_rules: >-
174174
{{ stackhpc_storage_firewalld_rules_default |
175175
selectattr('enabled', 'true') |
176176
map(attribute='rules') |
@@ -179,7 +179,7 @@ stackhpc_storage_firewalld_rules: |
179179
selectattr('zone') |
180180
union(stackhpc_storage_firewalld_rules_extra) |
181181
unique |
182-
select}}
182+
select }}
183183

184184
stackhpc_storage_firewalld_rules_default:
185185
# Common
@@ -214,7 +214,7 @@ stackhpc_storage_firewalld_extra: []
214214
###############################################################################
215215
# Monitoring firewalld rules
216216

217-
stackhpc_monitoring_firewalld_rules: |
217+
stackhpc_monitoring_firewalld_rules: >-
218218
{{ stackhpc_monitoring_firewalld_rules_default |
219219
selectattr('enabled', 'true') |
220220
map(attribute='rules') |
@@ -223,7 +223,7 @@ stackhpc_monitoring_firewalld_rules: |
223223
selectattr('zone') |
224224
union(stackhpc_monitoring_firewalld_rules_extra) |
225225
unique |
226-
select}}
226+
select }}
227227

228228
stackhpc_monitoring_firewalld_rules_default:
229229
- rules:
@@ -238,7 +238,7 @@ stackhpc_monitoring_firewalld_rules_extra: []
238238
###############################################################################
239239
# Infra VM firewalld rules (Wazuh Manager)
240240

241-
stackhpc_wazuh_manager_infra_vm_firewalld_rules: |
241+
stackhpc_wazuh_manager_infra_vm_firewalld_rules: >-
242242
{{ stackhpc_wazuh_manager_infra_vm_firewalld_rules_default |
243243
selectattr('enabled', 'true') |
244244
map(attribute='rules') |
@@ -247,18 +247,14 @@ stackhpc_wazuh_manager_infra_vm_firewalld_rules: |
247247
selectattr('zone') |
248248
union(stackhpc_wazuh_manager_infra_vm_firewalld_rules_extra) |
249249
unique |
250-
select}}
250+
select }}
251251

252252
stackhpc_wazuh_manager_infra_vm_firewalld_rules_default:
253253
- rules:
254254
- service: ssh
255255
zone: "{{ provision_oc_net_name | net_zone }}"
256256
network: "{{ provision_oc_net_name }}"
257257
state: enabled
258-
- service: ssh
259-
zone: "{{ switch_mgmt_net_name | net_zone }}"
260-
network: "{{ switch_mgmt_net_name }}"
261-
state: enabled
262258
- port: 1514/tcp
263259
zone: "{{ provision_oc_net_name | net_zone }}"
264260
network: "{{ provision_oc_net_name }}"
@@ -294,7 +290,7 @@ stackhpc_wazuh_manager_infra_vm_firewalld_rules_extra: []
294290
###############################################################################
295291
# Infra VM firewalld rules (Ansible Control)
296292

297-
stackhpc_ansible_control_infra_vm_firewalld_rules: |
293+
stackhpc_ansible_control_infra_vm_firewalld_rules: >-
298294
{{ stackhpc_ansible_control_infra_vm_firewalld_rules_default |
299295
selectattr('enabled', 'true') |
300296
map(attribute='rules') |
@@ -303,18 +299,14 @@ stackhpc_ansible_control_infra_vm_firewalld_rules: |
303299
selectattr('zone') |
304300
union(stackhpc_ansible_control_infra_vm_firewalld_rules_extra) |
305301
unique |
306-
select}}
302+
select }}
307303

308304
stackhpc_ansible_control_infra_vm_firewalld_rules_default:
309305
- rules:
310306
- service: ssh
311307
zone: "{{ provision_oc_net_name | net_zone }}"
312308
network: "{{ provision_oc_net_name }}"
313309
state: enabled
314-
- service: ssh
315-
zone: "{{ switch_mgmt_net_name | net_zone }}"
316-
network: "{{ switch_mgmt_net_name }}"
317-
state: enabled
318310
enabled: true
319311

320312
stackhpc_ansible_control_infra_vm_firewalld_rules_extra: []
@@ -324,7 +316,7 @@ stackhpc_ansible_control_infra_vm_firewalld_rules_extra: []
324316

325317

326318
stackhpc_seed_firewalld_rules: []
327-
# stackhpc_seed_firewalld_rules: |
319+
# stackhpc_seed_firewalld_rules: >-
328320
# {{ stackhpc_seed_firewalld_rules_default |
329321
# selectattr('enabled', 'true') |
330322
# map(attribute='rules') |
@@ -333,7 +325,7 @@ stackhpc_seed_firewalld_rules: []
333325
# selectattr('zone') |
334326
# union(stackhpc_seed_firewalld_rules_extra) |
335327
# unique |
336-
# select}}
328+
# select }}
337329

338330
# TODO: do
339331
stackhpc_seed_firewalld_rules_default: []
@@ -346,7 +338,7 @@ stackhpc_seed_firewalld_rules_extra: []
346338
###############################################################################
347339
# Seed Hypervisor firewalld rules
348340

349-
stackhpc_seed_hypervisor_firewalld_rules: |
341+
stackhpc_seed_hypervisor_firewalld_rules: >-
350342
{{ stackhpc_seed_hypervisor_firewalld_rules_default |
351343
selectattr('enabled', 'true') |
352344
map(attribute='rules') |
@@ -355,7 +347,7 @@ stackhpc_seed_hypervisor_firewalld_rules: |
355347
selectattr('zone') |
356348
union(stackhpc_seed_hypervisor_firewalld_rules_extra) |
357349
unique |
358-
select}}
350+
select }}
359351

360352
# TODO: Check
361353
stackhpc_seed_hypervisor_firewalld_rules_default:

etc/kayobe/networks.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,6 @@
6262
# Name of the network used to manage octavia loadbalancers
6363
octavia_net_name: ""
6464

65-
# Name of the network used to manage network switches
66-
switch_mgmt_net_name: ""
67-
6865
###############################################################################
6966
# Network definitions.
7067

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
features:
3+
- |
4+
A default firewall configuration is now included on an opt-in basis. The
5+
rules are defined under ``etc/kayobe/inventory/group_vars/all/firewall``.
6+
More information can be found `here
7+
<https://stackhpc-kayobe-config.readthedocs.io/en/stackhpc-2023.1/configuration/firewall.html>`__

0 commit comments

Comments
 (0)